CVE-2025-10596 Overview
A SQL Injection vulnerability has been identified in SourceCodester Online Exam Form Submission version 1.0. This vulnerability exists in the /index.php file where the usn parameter is improperly handled, allowing attackers to manipulate SQL queries through user-controlled input. The attack can be launched remotely without authentication, and an exploit has been made publicly available.
Critical Impact
Unauthenticated attackers can remotely inject malicious SQL queries through the usn parameter, potentially leading to unauthorized data access, data manipulation, or complete database compromise.
Affected Products
- Janobe Online Exam Form Submission version 1.0
- SourceCodester Online Exam Form Submission 1.0
Discovery Timeline
- 2025-09-17 - CVE-2025-10596 published to NVD
- 2025-09-22 - Last updated in NVD database
Technical Details for CVE-2025-10596
Vulnerability Analysis
This vulnerability is classified as SQL Injection (CWE-89) and more broadly as Injection (CWE-74). The vulnerability resides in the /index.php file of the Online Exam Form Submission application where user-supplied input via the usn parameter is incorporated directly into SQL queries without proper sanitization or parameterization.
When an attacker submits a crafted payload through the usn parameter, the application fails to properly validate or escape the input before including it in database queries. This allows the attacker to break out of the intended query structure and inject arbitrary SQL commands that the database will execute with the application's privileges.
The network-based attack vector means exploitation can occur remotely, and the lack of authentication requirements significantly increases the risk exposure. Successful exploitation could result in unauthorized access to sensitive exam data, user credentials, and other information stored in the database.
Root Cause
The root cause of this vulnerability is improper input validation and the absence of parameterized queries (prepared statements) in the application's database interaction layer. The usn parameter value is likely concatenated directly into SQL query strings without sanitization, allowing SQL metacharacters to alter the query logic.
Attack Vector
The attack is executed remotely over the network by submitting malicious input to the usn parameter in /index.php. An attacker can craft SQL injection payloads to:
- Extract data - Using UNION-based or error-based techniques to retrieve sensitive database contents
- Bypass authentication - Manipulating login queries to gain unauthorized access
- Modify data - Inserting, updating, or deleting records in the database
- Escalate access - Potentially gaining administrative privileges or accessing other database tables
The vulnerability can be exploited by sending crafted HTTP requests containing SQL injection payloads in the usn parameter. The malicious input bypasses any client-side validation and is processed directly by the server-side PHP code. Detailed technical information about this vulnerability can be found in the GitHub CVE Issue Discussion and VulDB Entry #324613.
Detection Methods for CVE-2025-10596
Indicators of Compromise
- Unusual or malformed requests to /index.php containing SQL syntax in the usn parameter
- Database error messages in application logs or HTTP responses indicating SQL syntax errors
- Unexpected database query patterns or excessive data retrieval operations
- Access logs showing requests with SQL keywords like UNION, SELECT, OR 1=1, or comment sequences (--, /**/)
Detection Strategies
- Deploy Web Application Firewall (WAF) rules to detect and block SQL injection patterns in the usn parameter
- Implement application-level logging to capture all requests to /index.php with parameter values
- Configure database activity monitoring to alert on anomalous query patterns or unauthorized data access
- Use intrusion detection systems (IDS) with SQL injection signature rules
Monitoring Recommendations
- Monitor web server access logs for requests containing SQL injection indicators targeting /index.php
- Enable database query logging and review for suspicious query structures
- Set up alerts for authentication bypass attempts or unauthorized administrative access
- Track database connection anomalies and unexpected bulk data operations
How to Mitigate CVE-2025-10596
Immediate Actions Required
- Remove or restrict public access to the Online Exam Form Submission application until patched
- Implement Web Application Firewall rules to filter SQL injection attempts on the usn parameter
- Review application logs and database audit trails for signs of exploitation
- Consider isolating the application database to limit potential damage from compromise
Patch Information
No official vendor patch has been identified for this vulnerability at the time of publication. Organizations using this application should contact the vendor or check the SourceCodester website for security updates. Given the public nature of the exploit, immediate protective measures are strongly recommended.
Workarounds
- Implement server-side input validation to sanitize the usn parameter before use in SQL queries
- Modify the application code to use prepared statements with parameterized queries
- Restrict network access to the application using firewall rules or IP whitelisting
- Deploy a reverse proxy with SQL injection filtering capabilities in front of the application
- Consider taking the application offline if it processes sensitive data and no fix is available
# Example WAF rule configuration for ModSecurity
SecRule ARGS:usn "@detectSQLi" \
"id:100001,\
phase:2,\
deny,\
status:403,\
log,\
msg:'SQL Injection attempt detected in usn parameter - CVE-2025-10596'"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

